URLhaus Database

You are currently viewing the URLhaus database entry for http://gzamora.es/9s52_ou17husakvth9fs_resource/sFe3aa/ which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry




ID:438948
URL: http://gzamora.es/9s52_ou17husakvth9fs_resource/sFe3aa/
URL Status:Offline
Host: gzamora.es
Date added:2020-08-22 11:40:30 UTC
Last online:2020-08-22 14:XX:XX UTC
Threat:Malware download Malware download
URLhaus blocklist:Not blocked
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
dns0.eu :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Blocked
Reporter: Cryptolaemus1
Abuse complaint sent (?): Yes (2020-08-22 11:42:09 UTC to abuse{at}oneandone[dot]net)
Takedown time:3 hours, 5 minutes Good (down since 2020-08-22 14:47:36 UTC)
Tags:emotet link epoch2 exe heodo link

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2020-08-22xxaR27GKTJp.exeexe 8b4f7b63d339ea2b2ac0c0cf864c644d0c87b7e17f27e89af6e893b7895a2688Virustotal results 7.14% Heodo
2020-08-22sbIl6.exeexe 06e1d04bb6cc00f27db9e3741ff86b3ebe292b5d3d366c1aa66c82c66b892392n/a Heodo
2020-08-22dMzhuMhPPmAnYUuCdE2.exeexe aea929007320e8039474d2586f64174a5aaeee60903311caf8ffeaa2bcf2c44cn/a Heodo
2020-08-22FLiU4uM5pQOiqQD.exeexe 326de64efb763ebe089e432010177de1e60adabd22ebdbdf67aba843d6b1476an/a Heodo
2020-08-22ZfLDklowoDA.exeexe 153c001391386c1f026debd198debd7a489066efd5342337cff8c3685347b850n/a Heodo
2020-08-22KiITQsCOoaKOtIRK.exeexe 5d534f5a95984eb3ddc80f5a266800949adc779cd65d2dd633c2fd3a47caccb4n/a Heodo